Welcome to Incremental Social! Learn more about this project here! Check out lemmyverse to find more communities to join from here!
MeanEYE , 5 months ago What makes you think mechanism that is used to install applications from Apple store can't be equally exploited as the mechanism that's used to install applications from a file? It's the same mechanism.
What makes you think mechanism that is used to install applications from Apple store can't be equally exploited as the mechanism that's used to install applications from a file? It's the same mechanism.